16.29 GUARDIAN: Guarded Expressions in Practice

Size: px
Start display at page:

Download "16.29 GUARDIAN: Guarded Expressions in Practice"

Transcription

1 564 CHAPTER 16 USER CONTRIBUTED PACKAGES 1629 GUARDIAN: Guarded Expressions in Practice Computer algebra systems typically drop some degenerate cases when evaluating expressions, eg, x/x becomes 1 dropping the case x = 0 We claim that it is feasible in practice to compute also the degenerate cases yielding guarded expressions We work over real closed fields but our ideas about handling guarded expression can be easily transferred to other situations Using formulas as guards provides a powerful tool for heuristically reducing the combinatorial explosion of cases: equivalent, redundant, tautological, and contradictive cases can be detected by simplification and quantifier elimination Our approach allows to simplify the expressions on the basis of simplification knowledge on the logical side The method described in this paper is implemented in the REDUCE package GUARDIAN Authors: Andreas Dolzmann and Thomas Sturm Introduction It is meanwhile a well-known fact that evaluations obtained with the interactive use of computer algebra systems (CAS) are not entirely correct in general Typically, some degenerate cases are dropped Consider for instance the evaluation x 2 x = x, which is correct only if x 0 The problem here is that CAS consider variables to be transcendental elements The user, in contrast, has in mind variables in the sense of logic In other words: The user does not think of rational functions but of terms Next consider the valid expression x + x x It is meaningless over the reals CAS often offer no choice than to interprete surds over the complex numbers even if they distinguish between a real and a complex mode Corless and Jeffrey [4] have examined the behavior of a number of CAS with such input data They come to the conclusion that simultaneous computation of all cases is exemplary but not feasible due to the combinatorial explosion of cases to be considered Therefore, they suggest to ignore the degenerate cases but to provide the assumptions to the user on request We claim, in contrast, that it is in fact feasible to compute all possible cases Our setting is as follows: Expressions are evaluated to guarded expressions consisting of possibly several conventional expressions guarded by quantifier-free for-

2 565 mulas For the above examples, we would obtain [ ] [ x 0 x, F x+ x x As the second example illustrates, we are working in ordered fields, more precisely in real closed fields The handling of guarded expressions as described in this paper can, however, be easily transferred to other situations Our approach can also deal with redundant guarded expressions, such as T x x x 0 0 x < 0 2x which leads to algebraic simplification techniques based on logical simplification as proposed by Davenport and Faure [5] We use formulas over the language of ordered rings as guards This provides powerful tools for heuristically reducing the combinatorial explosion of cases: equivalent, redundant, tautological, and contradictive cases can be detected by simplification [6] and quantifier elimination [17, 3, 18, 15, 21, 20] In certain situations, we will allow the formulas also to contain extra functions such as or Then we take care that there is no quantifier elimination applied Simultaneous computation of several cases concerning certain expressions being zero or not has been extensively investigated as dynamic evaluation [12, 10, 11, 2] It has also been extended to real closed fields [9] The idea behind the development of these methods is of a more theoretical nature than to overcome the problems with the interactive usage of CAS sketched above: one wishes to compute in algebraic (or real) extension fields of the rationals Guarded expressions occur naturally when solving problems parametrically Consider, eg, the Gröbner systems used during the computation of comprehensive Gröbner bases [19] The algorithms described in this paper are implemented in the REDUCE package GUARDIAN It is based on the REDUCE [13, 16] package REDLOG [7, 8] implementing a formula data type with corresponding algorithms, in particular including simplification and quantifier elimination ] An outline of our method Guarded expressions A guarded expression is a scheme γ 0 t 0 γ 1 t 1 γ n t n

3 566 CHAPTER 16 USER CONTRIBUTED PACKAGES where each γ i is a quantifier-free formula, the guard, and each t i is an associated conventional expression The idea is that some t i is a valid interpretation iff γ i holds Each pair (γ i, t i ) is called a case The first case (γ 0, t 0 ) is the generic case: t 0 is the expression the system would compute without our package, and γ 0 is the corresponding guard The guards γ i need neither exclude one another, nor do we require that they form a complete case distinction We shall, however, assume that all cases covered by a guarded expression are already covered by the generic case; in other words: n (γ i γ 0 ) (1674) Consider the following evaluation of x to a guarded expression: T x x 0 x x < 0 x i=1 Here the non-generic cases already cover the whole domain The generic case is in some way redundant It is just present for keeping track of the system s default behavior Formally we have ( n ) γ i γ 0 (1675) i=1 As an example for a non-redundant, ie, necessary generic case we have the evaluation of the reciprocal 1 x : [ x 0 1 x ] In every guarded expression, the generic case is explicitly marked as either necessary or redundant The corresponding tag is inherited during the evaluation process Unfortunately it can happen that guarded expressions satisfy (1675) without being tagged redundant, eg, specialization of [ T ] sin x x = 0 0 to x = 0 if the system cannot evaluate sin(0) This does not happen if one claims for necessary generic cases to have, as the reciprocal above, no alternative cases at all Else, in the sequel redundant generic case has to be read as tagged redundant With guarded expressions, the evaluation splits into two independent parts: Algebraic evaluation and a subsequent simplification of the guarded expression obtained

4 567 Guarding schemes In the introduction we have seen that certain operators introduce case distinctions For this, with each operator f there is a guarding scheme associated providing information on how to map f(t 1,, t m ) to a guarded expression provided that one does not have to care for the argument expressions t 1,, t m In the easiest case, this is a rewrite rule f(a 1,, a m ) G(a 1,, a m ) The actual terms t 1,, t m are simply substituted for the formal symbols a 1,, a m into the generic guarded expression G(a 1,, a m ) We give some examples: a [ ] 1 a 2 0 a 1 a a 2 2 a1 [ a 1 0 ] a 1 sign(a 1 ) a 1 T sign(a 1 ) a 1 > 0 1 a 1 = 0 0 a 1 < 0 T a 1 a 1 0 a 1 a 1 < 0 a 1 1 (1676) For functions of arbitrary arity, eg, min or max, we formally assume infinitely many operators of the same name Technically, we associate a procedure parameterized with the number of arguments m that generates the corresponding rewrite rule As min_scheme(2) we obtain, eg, min(a 1, a 2 ) T min(a 1, a 2 ) a 1 a 2 a 1 a 2 a 1 a 2 while for higher arities there are more case distinctions necessary, (1677) For later complexity analysis, we state the concept of a guarding scheme formally: a guarding scheme for an m-ary operator f is a map gscheme f : E m GE where E is the set of expressions, and GE is the set of guarded expressions This allows to split f(t 1,, t m ) in dependence on the form of the parameter expressions t 1,, t m

5 568 CHAPTER 16 USER CONTRIBUTED PACKAGES Algebraic evaluation Evaluating conventional expressions The evaluation of conventional expressions into guarded expressions is performed recursively: Constants c evaluate to [ ] T c For the evaluation of f(e 1,, e m ) the argument expressions e 1,, e m are recursively evaluated to guarded expressions e i = γ i0 γ i1 t i0 t i1 for 1 i m (1678) γ ini t ini Then the operator f is moved inside the e i by combining all cases, technically a simultaneous Cartesian product computation of both the sets of guards and the sets of terms: m m Γ = {γ i0,, γ ini }, T = {t i0,, t ini } (1679) i=1 This leads to the intermediate result γ 10 γ m0 f(t 10,, t m0 ) γ 1n1 γ m0 f(t 1n1,, t m0 ) (1680) γ 1n1 γ mnm f(t 1n1,, t mnm ) The new generic case is exactly the combination of the generic cases of the e i It is redundant if at least one of these combined cases is redundant Next, all non-generic cases containing at least one redundant generic constituent γ i0 in their guard are deleted The reason for this is that generic cases are only used to keep track of the system default behavior All other cases get the status of a non-generic case even if they contain necessary generic constituents in their guard At this point, we apply the guarding scheme of f to all remaining expressions f(t 1i1,, t mim ) in the form (1680) yielding a nested guarded expression δ 00 u 00 Γ 0 δ 0k0 u 0k0, (1681) δ N0 u N0 Γ N i=1 δ NkN u NkN

6 569 which can be straightforwardly resolved to a guarded expression Γ 0 δ 00 u 00 Γ 0 δ 0k0 u 0k0 Γ N δ N0 u N0 Γ N δ NkN u NkN This form is treated analogously to the form (1680): The new generic case (Γ 0 δ 00, u 00 ) is redundant if at least one of ( Γ 0, f(t 10,, t m0 ) ) and (δ 00, u 00 ) is redundant Among the non-generic cases all those containing redundant generic constituents in their guard are deleted, and all those containing necessary generic constituents in their guard get the status of an ordinary non-generic case Finally the standard evaluator of the system reval in the case of REDUCE is applied to all contained expressions, which completes the algebraic part of the evaluation Evaluating guarded expressions The previous section was concerned with the evaluation of pure conventional expressions into guarded expressions Our system currently combines both conventional and guarded expressions We are thus faced with the problem of treating guarded subexpressions during evaluation When there is a guarded subexpression e i detected during evaluation, all contained expressions are recursively evaluated to guarded expressions yielding a nested guarded expression of the form (1681) This is resolved as described above yielding the evaluation subresult e i As a special case, this explains how guarded expressions are (re)evaluated to guarded expressions Example We describe the evaluation of the expression min(x, x ) The first argument e 1 = x evaluates recursively to e 1 = [ T x ] (1682) with a necessary generic case The nested x inside e 2 = x evaluates to the same form (1682) For obtaining e 2, we apply the guarding scheme (1676) of the absolute value to the only term of (1682) yielding T x T x 0 x, x < 0 x

7 570 CHAPTER 16 USER CONTRIBUTED PACKAGES where the inner generic case is redundant This form is resolved to T T x e 2 = T x 0 x T x < 0 x with a redundant generic case The next step is the combination of cases by Cartesian product computation We obtain T (T T) min(x, x ) T (T x 0) min(x, x), T (T x < 0) min(x, x) which corresponds to (1680) above For the outer min, we apply the guarding scheme (1677) to all terms yielding the nested guarded expression T min(x, x ) T (T T) x x x x x x T min(x, x) T (T x 0) x x x, x x x T min(x, x) T (T x < 0) x x x x x x which is in turn resolved to (T (T T)) T min(x, x ) (T (T T)) x x x (T (T T)) x x x (T (T x 0)) T min(x, x) (T (T x 0)) x x x (T (T x 0)) x x x (T (T x < 0)) T min(x, x) (T (T x < 0)) x x x (T (T x < 0)) x x x From this, we delete the two non-generic cases obtained by combination with the redundant generic case of the min The final result of the algebraic evaluation step is the following: (T (T T)) T min(x, x ) (T (T T)) x x x (T (T T)) x x x (T (T x 0)) x x x (T (T x 0)) x x x (T (T x < 0)) x x x (T (T x < 0)) x x x (1683)

8 571 Worst-case complexity Our measure of complexity G for guarded expressions G is the number of contained cases: γ 0 t 0 γ 1 t 1 = n + 1 γ n t n As in Section 16292, consider an m-ary operator f, guarded expression arguments e 1,, e m as in equation (1678), and the Cartesian product T as in equation (1679) Then f(e 1,, e m) gscheme f (t 1,, t m ) (t 1,,t m) T max gscheme f (t 1,, t m ) #T (t 1,,t m) T = max (t 1,,t m) T gscheme f (t 1,, t m ) m e j j=1 max gscheme f (t 1,, t m ) ( max (t 1,,t m) T 1 j m e j ) m In the important special case that the guarding scheme of f is a rewrite rule f(a 1,, a m ) G, the above complexity estimation simplifies to f(e 1,, e m) G m j=1 e j G ( max 1 j m e j ) m In other words: G plays the role of a factor, which, however, depends on f, and f(e 1,, e m) is polynomial in the size of the e i but exponential in the arity of f Simplification In view of the increasing size of the guarded expressions coming into existence with subsequent computations, it is indispensable to apply simplification strategies There are two different algorithms involved in the simplification of guarded expressions: 1 A formula simplifier mapping quantifier-free formulas to equivalent simpler ones 2 Effective quantifier elimination for real closed fields over the language of ordered rings

9 572 CHAPTER 16 USER CONTRIBUTED PACKAGES It is not relevant, which simplifier and which quantifier elimination procedure is actually used We use the formula simplifier described in [6] Our quantifier elimination uses test point methods developed by Weispfenning [18, 15, 21] It is restricted to formulas obeying certain degree restrictions wrt the quantified variables As an alternative, REDLOG provides an interface to Hong s QEPCAD quantifier elimination package [14] Compared to the simplification, the quantifier elimination is more time consuming It can be turned off by a switch The following simplification steps are applied in the given order: Contraction of cases This is restricted to the non-generic cases of the considered guarded expression We contract different cases containing the same terms: γ 0 t 0 γ 0 t 0 γ i t i becomes γ i γ j t i γ j t i Simplification of the guards The simplifier is applied to all guards replacing them by simplified equivalents Since our simplifier maps γ γ to γ, this together with the contraction of cases takes care for the deletion of duplicate cases Keep one tautological case If the guard of some non-generic case becomes T, we delete all other non-generic cases Else, if quantifier elimination is turned on, we try to detect a tautology by eliminating the universal closures γ of the guards γ This quantifier elimination is also applied to the guards of generic cases These are, in case of success, simply replaced by T without deleting the case Remove contradictive cases A non-generic case is deleted if its guard has become F If quantifier elimination is turned on, we try to detect further contradictive cases by eliminating the existential closure γ for each guard γ This quantifier elimination is also applied to generic cases In case of success they are not deleted but their guards are replaced by F Our assumption (1674) allows then to delete all non-generic cases

10 573 Example revisited We turn back to the form (1683) of our example min(x, x ) Contraction of cases with subsequent simplification automatically yields T T x x 0 F min(x, x ) x x x of which only the tautological non-generic case survives: [ ] T min(x, x ) (1684) T x, Output modes An output mode determines which part of the information contained in the guarded expressions is provided to the user GUARDIAN knows the following output modes: Matrix Output matrices in the style used throughout this paper We have already seen that these can become very large in general Generic case Output only the generic case Generic term Output only the generic term Thus the output is exactly the same as without the guardian package If the condition of the generic case becomes F, a warning contradictive situation is given The computation can, however, be continued Note that output modes are restrictions concerning only the output; internally the system still computes with the complete guarded expressions A smart mode Consider the evaluation result (1684) of min(x, x ) The generic term output mode would output min(x, x ), although more precise information could be given, namely x The problem is caused by the fact that generic cases are used to keep track of the system s default behavior In this section we will describe an optional smart mode with a different notion of generic case To begin with, we show why the problem can not be overcome by a smart output mode

11 574 CHAPTER 16 USER CONTRIBUTED PACKAGES Assume that there is an output mode which outputs x for (1684) As the next computation involving (1684) consider division by y This would result in [ ] y 0 min(x, x ) y y 0 Again, there are identic conditions for the generic case and some non-generic case, and, again, the term belonging to the latter is simpler Our mode would output x y Next, we apply the absolute value once more yielding y 0 xy 0 y 0 xy < 0 y 0 x y min(x, x ) y x y x y Here, the condition of the generic case differs from all other conditions We thus have to output the generic term For the user, the evaluation of x y results in min(x, x ) y The smart mode can turn a non-generic case into a necessary generic one dropping the original generic case and all other non-generic cases Consider, eg, (1684), where the conditions are equal, and the non-generic term is simpler In fact, the relevant relationship between the conditions is that the generic condition implies the non-generic one In other words: Some non-generic condition is not more restrictive than the generic condition, and thus covers the whole domain of the guarded expression Note that from the implication and (1674) we may conclude that the cases are even equivalent Implication is heuristically checked by simplification If this fails, quantifier elimination provides a decision procedure Note that our test point methods are incomplete in this regard due to the degree restrictions Also it cannot be applied straightforwardly to guards containing operators that do not belong to the language of ordered rings Whenever we happen to detect a relevant implication, we actually turn the corresponding non-generic case into the generic one From our motivation of nongeneric cases, we may expect that non-generic expressions are generally more convenient than generic ones Examples We give the results for the following computations as they are printed in the output mode matrix providing the full information on the computation result The reader can derive himself what the output in the mode generic case or generic term would be

12 575 Smart mode or not: 1 [ x 2 + 2x + 1 = x x 2 +2x+1 The simplifier recognizes that the denominator is a square Smart mode or not: 1 [ x 2 + 2x + 2 = T 1 x 2 +2x+2 Quantifier elimination recognizes the positive definiteness of the denominator Smart mode: ] x x = [ x 0 x + x ] The square root allows to forget about the negative branch of the absolute value Smart mode: x 2 + 2x + 1 = [ T x 2 + 2x + 1 ] The simplifier recognizes the positive semidefiniteness of the argument RE- DUCE itself recognizes squares within absolute values only in very special cases such as x 2 Smart mode: min ( x, max(x, y) ) = [ T x ] Note that REDUCE does not know any rules about nested minima and maxima ] Smart mode: min ( sign(x), 1 ) = [ T 1 ] Smart mode or not: x x = This example is taken from [5] T x x x 0 0 x < 0 2x Smart mode or not: 1 + x 2 y 2 (x 2 + y 2 3) = [ T x 4 y 2 + x 2 y 4 3x 2 y ] The Motzkin polynomial is recognized to be positive semidefinite by quantifier elimination The evaluation time for the last example is 119 ms on a SUN SPARC-4 This illustrates that efficiency is no problem with such interactive examples

13 576 CHAPTER 16 USER CONTRIBUTED PACKAGES Outlook This section describes possible extensions of the GUARDIAN The extensions proposed in Section on simplification of terms and Section on a background theory are clear from a theoretical point of view but not yet implemented Section collects some ideas on the application of our ideas to the REDUCE integrator In this field, there is some more theoretical work necessary Simplification of terms Consider the expression sign(x)x x It evaluates to the following guarded expression: T x + sign(x)x x 0 0 x = 0 x This suggests to substitute x by 0 in the third case, which would in turn allow to contract the two non-generic cases yielding [ ] T x + sign(x)x T 0 In smart mode second case would then become the only generic case Generally, one would proceed as follows: If the guard is a conjunction containing as toplevel equations t 1 = 0,, t k = 0, reduce the corresponding expression modulo the set of univariate linear polynomials among t 1,, t k A more general approach would reduce the expression modulo a Gröbner basis of all the t 1,, t k This leads, however, to larger expressions in general One can also imagine to make use of non-conjunctive guards in the following way: 1 Compute a DNF of the guard 2 Split the case into several cases corresponding to the conjunctions in the DNF 3 Simplify the terms 4 Apply the standard simplification procedure to the resulting guarded expression Note that it includes contraction of cases According to experiences with similar ideas in the Gröbner simplifier described in [6], this should work well

14 577 Background theory In practice one often computes with quantities guaranteed to lie in a certain range For instance, when computing an electrical resistance, one knows in advance that it will not be negative For such cases one would like to have some facility to provide external information to the system This can then be used to reduce the complexity of the guarded expressions One would provide a function assert(ϕ), which asserts the formula ϕ to hold Successive applications of assert establish a background theory, which is a set of formulas considered conjunctively The information contained in the background theory can be used with the guarded expression computation The user must, however, not rely on all the background information to be actually used Technically, denote by Φ the (conjunctive) background theory For the simplification of the guards, we can make use of the fact that our simplifier is designed to simplify wrt a theory, cf [6] For proving that some guard γ is tautological, we try to prove (Φ γ) instead of γ Similarly, for proving that γ is contradictive, we try to disprove (Φ γ) Instead of proving (γ 1 γ 2 ) in smart mode, we try to prove ( (Φ γ 1 ) γ 2 ) Independently, one can imagine to use a background theory for reducing the output with the matrix output mode For this, one simplifies each guard wrt the theory at the output stage treating contradictions and tautologies appropriately Using the theory for replacing all cases by one at output stage in a smart mode manner leads once more to the problem of expressions or even guarded expressions mysteriously getting more complicated Applying the theory only at the output stage makes it possible to implement a procedure unassert(ϕ) in a reasonable way Integration CAS integrators make mistakes similar to those we have examined Consider, eg, the typical result x a dx = 1 a + 1 xa+1 It does not cover the case a = 1, for which one wishes to obtain x 1 dx = ln x

15 578 CHAPTER 16 USER CONTRIBUTED PACKAGES This problem can also be solved by using guarded expressions for integration results Within the framework of this paper, we would have to associate a guarding scheme to the integrator int It is not hard to see that this cannot be done in a reasonable way without putting as much knowledge into the scheme as into the integrator itself Thus for treating integration, one has to modify the integrator to provide guarded expressions Next, we have to clarify what the guarded expression for the above integral would look like Since we know that the integral is defined for all interpretations of the variables, our assumption (1674) implies that the generic condition be T We obtain the guarded expression T x a dx 1 a 1 a+1 xa+1 a = 1 ln x Note that the redundant generic case does not model the system s current behavior Combining algebra with logic Our method, in the described form, uses an already implemented algebraic evaluator In the previous section, we have seen that this point of view is not sufficient for treating integration appropriately Also our approach runs into trouble with built-in knowledge such as x 2 = x, (1685) sign( x ) = 1 (1686) Equation (1685) introduces an absolute value operator within a non-generic term without making a case distinction Equation (1686) is wrong when not considering x transcendental In contrast to the situation with reciprocals, our technique cannot be used to avoid this mistake We obtain sign( x ) = yielding two different answers for x = 0 T 1 x 0 1 x = 0 0 We have already seen in the example Section that the implementation of knowledge such as (1685) and (1686) is usually quite ad hoc, and can be mostly covered by using guarded expressions This obesrvation gives rise to the following question: When designing a new CAS based on guarded expressions, how should the knowledge be distributed between the algebraic side and the logic side?

16 Conclusions Guarded expressions can be used to overcome well-known problems with interpreting expressions as terms We have explained in detail how to compute with guarded expressions including several simplification techniques Moreover we gain algebraic simplification power from the logical simplifications Numerous examples illustrate the power of our simplification methods The largest part of our ideas is efficiently implemented, and the software is published The outlook on background theories and on the treatment of integration by guarded expressions points on interesting future extensions Bibliography [1] Bradford, R Algebraic simplification of multiple valued functions In Design and Implementation of Symbolic Computation Systems (1992), J Fitch, Ed, vol 721 of Lecture Notes in Computer Science, Springer-Verlag, pp Proceedings of the DISCO 92 [2] Broadberry, P, Gómez-Díaz, T, and Watt, S On the implementation of dynamic evaluation In Proceedings of the International Symposium on Symbolic and Algebraic Manipulation (ISSAC 95) (New York, NY, 1995), A Levelt, Ed, ACM Press, pp [3] Collins, G E Quantifier elimination for the elementary theory of real closed fields by cylindrical algebraic decomposition In Automata Theory and Formal Languages 2nd GI Conference (Berlin, Heidelberg, New York, May 1975), H Brakhage, Ed, vol 33 of Lecture Notes in Computer Science, Gesellschaft für Informatik, Springer-Verlag, pp [4] Corless, R M, and Jeffrey, D J Well it isn t quite that simple ACM SIGSAM Bulletin 26, 3 (Aug 1992), 2 6 Feature [5] Davenport, J H, and Faure, C The unknown in computer algebra Programmirovanie 1, 1 (1994) [6] Dolzmann, A, and Sturm, T Simplification of quantifier-free formulas over ordered fields Technical Report MIP-9517, FMI, Universität Passau, D Passau, Germany, Oct 1995 To appear in the Journal of Symbolic Computation [7] Dolzmann, A, and Sturm, T Redlog computer algebra meets computer logic Technical Report MIP-9603, FMI, Universität Passau, D Passau, Germany, Feb 1996

17 580 CHAPTER 16 USER CONTRIBUTED PACKAGES [8] Dolzmann, A, and Sturm, T Redlog user manual Technical Report MIP- 9616, FMI, Universität Passau, D Passau, Germany, Oct 1996 Edition 10 for Version 10 [9] Duval, D, and Gonzáles-Vega, L Dynamic evaluation and real closure In Proceedings of the IMACS Symposium on Symbolic Computation (1993) [10] Duval, D, and Reynaud, J-C Sketches and computation I: Basic definitions and static evaluation Mathematical Structures in Computer Science 4, 2 (1994), [11] Duval, D, and Reynaud, J-C Sketches and computation II: Dynamic evaluation and applications Mathematical Structures in Computer Science 4, 2 (1994), [12] Gómez-Díaz, T Examples of using dynamic constructible closure In Proceedings of the IMACS Symposium on Symbolic Computation (1993) [13] Hearn, A C, and Fitch, J P Reduce User s Manual for Version 36 RAND, Santa Monica, CA , July 1995 RAND Publication CP78 [14] Hong, H, Collins, G E, Johnson, J R, and Encarnacion, M J QEPCAD interactive version 12 Kindly communicated to us by Hoon Hong, Sept 1993 [15] Loos, R, and Weispfenning, V Applying linear quantifier elimination The Computer Journal 36, 5 (1993), Special issue on computational quantifier elimination [16] Melenk, H Reduce symbolic mode primer In REDUCE 36 User s Guide for UNIX Konrad-Zuse-Institut, Berlin, 1995 [17] Tarski, A A decision method for elementary algebra and geometry Tech rep, University of California, 1948 Second edn, rev 1951 [18] Weispfenning, V The complexity of linear problems in fields Journal of Symbolic Computation 5, 1 (Feb 1988), 3 27 [19] Weispfenning, V Comprehensive Gröbner bases Journal of Symbolic Computation 14 (July 1992), 1 29 [20] Weispfenning, V Quantifier elimination for real algebra the cubic case In Proceedings of the International Symposium on Symbolic and Algebraic Computation in Oxford (New York, July 1994), ACM Press, pp [21] Weispfenning, V Quantifier elimination for real algebra the quadratic case and beyond To appear in AAECC

Quantifier Elimination

Quantifier Elimination J.JSSAC (2003) Vol. 10, No. 1, pp. 3-12 Quantifier Elimination Quantifier Elimination ( ) IT 1 (quantifier elimination problem) (formal theory) ( ) (quantifier elimination :QE) (elementary theory of real

More information

Estimating the Region of Attraction of Ordinary Differential Equations by Quantified Constraint Solving

Estimating the Region of Attraction of Ordinary Differential Equations by Quantified Constraint Solving Estimating the Region of Attraction of Ordinary Differential Equations by Quantified Constraint Solving Henning Burchardt and Stefan Ratschan October 31, 2007 Abstract We formulate the problem of estimating

More information

A Type-Coercion Problem in Computer Algebra

A Type-Coercion Problem in Computer Algebra Lecture Notes in Computer Science 737, pages 188 194 A Type-Coercion Problem in Computer Algebra Andreas Weber Wilhelm-Schickard-Institut Universität Tübingen W-7400 Tübingen, Germany hweber@informatik.uni-tuebingen.dei

More information

REDLOG-aided derivation of feasibility conditions in applied mechanics and engineering problems under simple inequality constraints

REDLOG-aided derivation of feasibility conditions in applied mechanics and engineering problems under simple inequality constraints DIVISION OF APPLIED MATHEMATICS AND MECHANICS DEPARTMENT OF ENGINEERING SCIENCES SCHOOL OF ENGINEERING, UNIVERSITY OF PATRAS TECHNICAL REPORT No. TR-1998-O3, 15 October 1998 1 REDLOG-aided derivation of

More information

SOLVING ALGEBRAIC INEQUALITIES

SOLVING ALGEBRAIC INEQUALITIES SOLVING ALGEBRAIC INEQUALITIES ADAM STRZEBOŃSKI ABSTRACT. We study the problem of solving, possibly quantified, systems of real algebraic equations and inequalities. We propose a way of representing solution

More information

3 The language of proof

3 The language of proof 3 The language of proof After working through this section, you should be able to: (a) understand what is asserted by various types of mathematical statements, in particular implications and equivalences;

More information

A HYPERGEOMETRIC INEQUALITY

A HYPERGEOMETRIC INEQUALITY A HYPERGEOMETRIC INEQUALITY ATUL DIXIT, VICTOR H. MOLL, AND VERONIKA PILLWEIN Abstract. A sequence of coefficients that appeared in the evaluation of a rational integral has been shown to be unimodal.

More information

CHAPTER 1: Functions

CHAPTER 1: Functions CHAPTER 1: Functions 1.1: Functions 1.2: Graphs of Functions 1.3: Basic Graphs and Symmetry 1.4: Transformations 1.5: Piecewise-Defined Functions; Limits and Continuity in Calculus 1.6: Combining Functions

More information

A heuristic prover for real inequalities

A heuristic prover for real inequalities A heuristic prover for real inequalities Jeremy Avigad Department of Philosophy and Department of Mathematical Sciences Carnegie Mellon University joint work with Robert Y. Lewis and Cody Roux (many slides

More information

Understanding Branch Cuts of Expressions

Understanding Branch Cuts of Expressions The University of Bath Joint work with: Russell Bradford, James Davenport & David Wilson (Bath) and Edgardo Cheb-Terrab (Maplesoft) University of Waterloo 21st June 2013 Supported by the Engineering and

More information

Manual of Logical Style

Manual of Logical Style Manual of Logical Style Dr. Holmes January 9, 2015 Contents 1 Introduction 2 2 Conjunction 3 2.1 Proving a conjunction...................... 3 2.2 Using a conjunction........................ 3 3 Implication

More information

Introduction to Metalogic

Introduction to Metalogic Philosophy 135 Spring 2008 Tony Martin Introduction to Metalogic 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: Remarks: (i) sentence letters p 0, p 1, p 2,... (ii)

More information

Estimating the Region of Attraction of Ordinary Differential Equations by Quantified Constraint Solving

Estimating the Region of Attraction of Ordinary Differential Equations by Quantified Constraint Solving Proceedings of the 3rd WSEAS/IASME International Conference on Dynamical Systems and Control, Arcachon, France, October 13-15, 2007 241 Estimating the Region of Attraction of Ordinary Differential Equations

More information

Motivation. CS389L: Automated Logical Reasoning. Lecture 10: Overview of First-Order Theories. Signature and Axioms of First-Order Theory

Motivation. CS389L: Automated Logical Reasoning. Lecture 10: Overview of First-Order Theories. Signature and Axioms of First-Order Theory Motivation CS389L: Automated Logical Reasoning Lecture 10: Overview of First-Order Theories Işıl Dillig Last few lectures: Full first-order logic In FOL, functions/predicates are uninterpreted (i.e., structure

More information

Formal methods in analysis

Formal methods in analysis Formal methods in analysis Jeremy Avigad Department of Philosophy and Department of Mathematical Sciences Carnegie Mellon University May 2015 Sequence of lectures 1. Formal methods in mathematics 2. Automated

More information

Manual of Logical Style (fresh version 2018)

Manual of Logical Style (fresh version 2018) Manual of Logical Style (fresh version 2018) Randall Holmes 9/5/2018 1 Introduction This is a fresh version of a document I have been working on with my classes at various levels for years. The idea that

More information

Proving Completeness for Nested Sequent Calculi 1

Proving Completeness for Nested Sequent Calculi 1 Proving Completeness for Nested Sequent Calculi 1 Melvin Fitting abstract. Proving the completeness of classical propositional logic by using maximal consistent sets is perhaps the most common method there

More information

Designing Information Devices and Systems I Fall 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way

Designing Information Devices and Systems I Fall 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way EECS 16A Designing Information Devices and Systems I Fall 018 Lecture Notes Note 1 1.1 Introduction to Linear Algebra the EECS Way In this note, we will teach the basics of linear algebra and relate it

More information

0. Introduction 1 0. INTRODUCTION

0. Introduction 1 0. INTRODUCTION 0. Introduction 1 0. INTRODUCTION In a very rough sketch we explain what algebraic geometry is about and what it can be used for. We stress the many correlations with other fields of research, such as

More information

Math Precalculus I University of Hawai i at Mānoa Spring

Math Precalculus I University of Hawai i at Mānoa Spring Math 135 - Precalculus I University of Hawai i at Mānoa Spring - 2014 Created for Math 135, Spring 2008 by Lukasz Grabarek and Michael Joyce Send comments and corrections to lukasz@math.hawaii.edu Contents

More information

Math 10850, fall 2017, University of Notre Dame

Math 10850, fall 2017, University of Notre Dame Math 10850, fall 2017, University of Notre Dame Notes on first exam September 22, 2017 The key facts The first midterm will be on Thursday, September 28, 6.15pm-7.45pm in Hayes-Healy 127. What you need

More information

Metainduction in Operational Set Theory

Metainduction in Operational Set Theory Metainduction in Operational Set Theory Luis E. Sanchis Department of Electrical Engineering and Computer Science Syracuse University Syracuse, NY 13244-4100 Sanchis@top.cis.syr.edu http://www.cis.syr.edu/

More information

Algebra Exam. Solutions and Grading Guide

Algebra Exam. Solutions and Grading Guide Algebra Exam Solutions and Grading Guide You should use this grading guide to carefully grade your own exam, trying to be as objective as possible about what score the TAs would give your responses. Full

More information

From Constructibility and Absoluteness to Computability and Domain Independence

From Constructibility and Absoluteness to Computability and Domain Independence From Constructibility and Absoluteness to Computability and Domain Independence Arnon Avron School of Computer Science Tel Aviv University, Tel Aviv 69978, Israel aa@math.tau.ac.il Abstract. Gödel s main

More information

LECTURE 1. Logic and Proofs

LECTURE 1. Logic and Proofs LECTURE 1 Logic and Proofs The primary purpose of this course is to introduce you, most of whom are mathematics majors, to the most fundamental skills of a mathematician; the ability to read, write, and

More information

Solving Parametric Polynomial Systems by RealComprehensiveTriangularize

Solving Parametric Polynomial Systems by RealComprehensiveTriangularize Solving Parametric Polynomial Systems by RealComprehensiveTriangularize Changbo Chen 1 and Marc Moreno Maza 2 1 Chongqing Key Laboratory of Automated Reasoning and Cognition, Chongqing Institute of Green

More information

7x 5 x 2 x + 2. = 7x 5. (x + 1)(x 2). 4 x

7x 5 x 2 x + 2. = 7x 5. (x + 1)(x 2). 4 x Advanced Integration Techniques: Partial Fractions The method of partial fractions can occasionally make it possible to find the integral of a quotient of rational functions. Partial fractions gives us

More information

Entailment with Conditional Equality Constraints (Extended Version)

Entailment with Conditional Equality Constraints (Extended Version) Entailment with Conditional Equality Constraints (Extended Version) Zhendong Su Alexander Aiken Report No. UCB/CSD-00-1113 October 2000 Computer Science Division (EECS) University of California Berkeley,

More information

Designing Information Devices and Systems I Spring 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way

Designing Information Devices and Systems I Spring 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way EECS 16A Designing Information Devices and Systems I Spring 018 Lecture Notes Note 1 1.1 Introduction to Linear Algebra the EECS Way In this note, we will teach the basics of linear algebra and relate

More information

Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes

Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes These notes form a brief summary of what has been covered during the lectures. All the definitions must be memorized and understood. Statements

More information

Relations and Functions (for Math 026 review)

Relations and Functions (for Math 026 review) Section 3.1 Relations and Functions (for Math 026 review) Objective 1: Understanding the s of Relations and Functions Relation A relation is a correspondence between two sets A and B such that each element

More information

First-Order Logic. Chapter Overview Syntax

First-Order Logic. Chapter Overview Syntax Chapter 10 First-Order Logic 10.1 Overview First-Order Logic is the calculus one usually has in mind when using the word logic. It is expressive enough for all of mathematics, except for those concepts

More information

Supplementary Logic Notes CSE 321 Winter 2009

Supplementary Logic Notes CSE 321 Winter 2009 1 Propositional Logic Supplementary Logic Notes CSE 321 Winter 2009 1.1 More efficient truth table methods The method of using truth tables to prove facts about propositional formulas can be a very tedious

More information

SMT Nonlinear Real Arithmetic and Computer Algebra: a Dialog

SMT Nonlinear Real Arithmetic and Computer Algebra: a Dialog SMT Nonlinear Real Arithmetic and Computer Algebra: a Dialogue of the Deaf? James 1 University of Bath J.H.@bath.ac.uk 23 July 2017 1 Thanks to EU H2020-FETOPEN-2016-2017-CSA project SC 2 (712689) and

More information

Section 3.1: Direct Proof and Counterexample 1

Section 3.1: Direct Proof and Counterexample 1 Section 3.1: Direct Proof and Counterexample 1 In this chapter, we introduce the notion of proof in mathematics. A mathematical proof is valid logical argument in mathematics which shows that a given conclusion

More information

Proof strategies, or, a manual of logical style

Proof strategies, or, a manual of logical style Proof strategies, or, a manual of logical style Dr Holmes September 27, 2017 This is yet another version of the manual of logical style I have been working on for many years This semester, instead of posting

More information

Deciding Presburger Arithmetic

Deciding Presburger Arithmetic Deciding Presburger Arithmetic Michael Norrish Michael.Norrish@nicta.com.au National ICT Australia Michael Norrish (National ICT Australia) LSS2006: Presburger Arithmetic 1 / 62 Outline 1 Introduction

More information

PART II: Research Proposal Algorithms for the Simplification of Algebraic Formulae

PART II: Research Proposal Algorithms for the Simplification of Algebraic Formulae Form 101 Part II 6 Monagan, 195283 PART II: Research Proposal Algorithms for the Simplification of Algebraic Formulae 1 Research Area Computer algebra (CA) or symbolic computation, as my field is known

More information

Warm-Up Problem. Is the following true or false? 1/35

Warm-Up Problem. Is the following true or false? 1/35 Warm-Up Problem Is the following true or false? 1/35 Propositional Logic: Resolution Carmen Bruni Lecture 6 Based on work by J Buss, A Gao, L Kari, A Lubiw, B Bonakdarpour, D Maftuleac, C Roberts, R Trefler,

More information

Controller Synthesis for Hybrid Systems using SMT Solving

Controller Synthesis for Hybrid Systems using SMT Solving Controller Synthesis for Hybrid Systems using SMT Solving Ulrich Loup AlgoSyn (GRK 1298) Hybrid Systems Group Prof. Dr. Erika Ábrahám GRK Workshop 2009, Schloss Dagstuhl Our model: hybrid system Discrete

More information

Polynomials, Ideals, and Gröbner Bases

Polynomials, Ideals, and Gröbner Bases Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields

More information

Daniel Lazard and Polynomial Systems A Personal View

Daniel Lazard and Polynomial Systems A Personal View Daniel Lazard and Polynomial Systems A Personal View James H. Davenport Department of Computer Science University of Bath Bath BA2 7AY England J.H.Davenport@bath.ac.uk December 1, 2004 1 Introduction This

More information

Lecture 5: Efficient PAC Learning. 1 Consistent Learning: a Bound on Sample Complexity

Lecture 5: Efficient PAC Learning. 1 Consistent Learning: a Bound on Sample Complexity Universität zu Lübeck Institut für Theoretische Informatik Lecture notes on Knowledge-Based and Learning Systems by Maciej Liśkiewicz Lecture 5: Efficient PAC Learning 1 Consistent Learning: a Bound on

More information

Automata Theory and Formal Grammars: Lecture 1

Automata Theory and Formal Grammars: Lecture 1 Automata Theory and Formal Grammars: Lecture 1 Sets, Languages, Logic Automata Theory and Formal Grammars: Lecture 1 p.1/72 Sets, Languages, Logic Today Course Overview Administrivia Sets Theory (Review?)

More information

Computer Algebra and Formal Proof

Computer Algebra and Formal Proof James 1 University of Bath J.H.@bath.ac.uk 21 July 2017 1 Thanks to EU H2020-FETOPEN-2016-2017-CSA project SC 2 (712689) and the Isaac Newton Institute through EPSRC K/032208/1 Computer Algebra Systems

More information

Gödel s Incompleteness Theorems

Gödel s Incompleteness Theorems Seminar Report Gödel s Incompleteness Theorems Ahmet Aspir Mark Nardi 28.02.2018 Supervisor: Dr. Georg Moser Abstract Gödel s incompleteness theorems are very fundamental for mathematics and computational

More information

Math 38: Graph Theory Spring 2004 Dartmouth College. On Writing Proofs. 1 Introduction. 2 Finding A Solution

Math 38: Graph Theory Spring 2004 Dartmouth College. On Writing Proofs. 1 Introduction. 2 Finding A Solution Math 38: Graph Theory Spring 2004 Dartmouth College 1 Introduction On Writing Proofs What constitutes a well-written proof? A simple but rather vague answer is that a well-written proof is both clear and

More information

Numeric Deduction in Symbolic Computation. Application to Normalizing Transformations

Numeric Deduction in Symbolic Computation. Application to Normalizing Transformations arxiv:1607.02016v1 [cs.sc] 27 May 2016 Numeric Deduction in Symbolic Computation. Application to Normalizing Transformations Ivan I. Shevchenko Institute of Theoretical Astronomy, Russian Academy of Sciences,

More information

V. Graph Sketching and Max-Min Problems

V. Graph Sketching and Max-Min Problems V. Graph Sketching and Max-Min Problems The signs of the first and second derivatives of a function tell us something about the shape of its graph. In this chapter we learn how to find that information.

More information

Core A-level mathematics reproduced from the QCA s Subject criteria for Mathematics document

Core A-level mathematics reproduced from the QCA s Subject criteria for Mathematics document Core A-level mathematics reproduced from the QCA s Subject criteria for Mathematics document Background knowledge: (a) The arithmetic of integers (including HCFs and LCMs), of fractions, and of real numbers.

More information

Logic and Proofs 1. 1 Overview. 2 Sentential Connectives. John Nachbar Washington University December 26, 2014

Logic and Proofs 1. 1 Overview. 2 Sentential Connectives. John Nachbar Washington University December 26, 2014 John Nachbar Washington University December 26, 2014 Logic and Proofs 1 1 Overview. These notes provide an informal introduction to some basic concepts in logic. For a careful exposition, see, for example,

More information

1.5 Non-linear Real Arithmetic

1.5 Non-linear Real Arithmetic A Simplex variant: Transform the satisfiability problem into the form A x = 0 l x u (where l i may be and u i may be + ). Relation to optimization problem is obscured. But: More efficient if one needs

More information

This is logically equivalent to the conjunction of the positive assertion Minimal Arithmetic and Representability

This is logically equivalent to the conjunction of the positive assertion Minimal Arithmetic and Representability 16.2. MINIMAL ARITHMETIC AND REPRESENTABILITY 207 If T is a consistent theory in the language of arithmetic, we say a set S is defined in T by D(x) if for all n, if n is in S, then D(n) is a theorem of

More information

Formal Verification Methods 1: Propositional Logic

Formal Verification Methods 1: Propositional Logic Formal Verification Methods 1: Propositional Logic John Harrison Intel Corporation Course overview Propositional logic A resurgence of interest Logic and circuits Normal forms The Davis-Putnam procedure

More information

A Note on Bootstrapping Intuitionistic Bounded Arithmetic

A Note on Bootstrapping Intuitionistic Bounded Arithmetic A Note on Bootstrapping Intuitionistic Bounded Arithmetic SAMUEL R. BUSS Department of Mathematics University of California, San Diego Abstract This paper, firstly, discusses the relationship between Buss

More information

Chapter Usual types of questions Tips What can go ugly. and, common denominator will be

Chapter Usual types of questions Tips What can go ugly. and, common denominator will be C3 Cheat Sheet Chapter Usual types of questions Tips What can go ugly 1 Algebraic Almost always adding or subtracting Factorise everything in each fraction first. e.g. If denominators Blindly multiplying

More information

3 The Semantics of the Propositional Calculus

3 The Semantics of the Propositional Calculus 3 The Semantics of the Propositional Calculus 1. Interpretations Formulas of the propositional calculus express statement forms. In chapter two, we gave informal descriptions of the meanings of the logical

More information

Notes on Computer Systems for Solving Symbolic Equations

Notes on Computer Systems for Solving Symbolic Equations Notes on Computer Systems for Solving Symbolic Equations Richard J. Fateman March, 1991, revisited 2005 Abstract Math students learn to solve single equations symbolically beginning in elementary or junior

More information

A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ

A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ NICOLAS FORD Abstract. The goal of this paper is to present a proof of the Nullstellensatz using tools from a branch of logic called model theory. In

More information

CONTENTS. Appendix C: Gothic Alphabet 109

CONTENTS. Appendix C: Gothic Alphabet 109 Contents 1 Sentential Logic 1 1.1 Introduction............................ 1 1.2 Sentences of Sentential Logic................... 2 1.3 Truth Assignments........................ 7 1.4 Logical Consequence.......................

More information

MA103 Introduction to Abstract Mathematics Second part, Analysis and Algebra

MA103 Introduction to Abstract Mathematics Second part, Analysis and Algebra 206/7 MA03 Introduction to Abstract Mathematics Second part, Analysis and Algebra Amol Sasane Revised by Jozef Skokan, Konrad Swanepoel, and Graham Brightwell Copyright c London School of Economics 206

More information

Taylor series. Chapter Introduction From geometric series to Taylor polynomials

Taylor series. Chapter Introduction From geometric series to Taylor polynomials Chapter 2 Taylor series 2. Introduction The topic of this chapter is find approximations of functions in terms of power series, also called Taylor series. Such series can be described informally as infinite

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Miller Objectives Alignment Math

Miller Objectives Alignment Math Miller Objectives Alignment Math 1050 1 College Algebra Course Objectives Spring Semester 2016 1. Use algebraic methods to solve a variety of problems involving exponential, logarithmic, polynomial, and

More information

Axiomatic set theory. Chapter Why axiomatic set theory?

Axiomatic set theory. Chapter Why axiomatic set theory? Chapter 1 Axiomatic set theory 1.1 Why axiomatic set theory? Essentially all mathematical theories deal with sets in one way or another. In most cases, however, the use of set theory is limited to its

More information

On the denesting of nested square roots

On the denesting of nested square roots International Journal of Mathematical Education in Science and Technology, Vol. 00, No. 00, 15 January 2008, 1 11 On the denesting of nested suare roots Eleftherios Gkioulekas University of Texas Rio Grande

More information

Solution Formulas for Cubic Equations Without or With Constraints

Solution Formulas for Cubic Equations Without or With Constraints Solution Formulas for Cubic Equations Without or With Constraints Ting Zhao, Dongming Wang, Hoon Hong To cite this version: Ting Zhao, Dongming Wang, Hoon Hong. Solution Formulas for Cubic Equations Without

More information

ALGEBRA I Number and Quantity The Real Number System (N-RN)

ALGEBRA I Number and Quantity The Real Number System (N-RN) Number and Quantity The Real Number System (N-RN) Use properties of rational and irrational numbers Additional N-RN.3 Explain why the sum or product of two rational numbers is rational; that the sum of

More information

The Integers. Peter J. Kahn

The Integers. Peter J. Kahn Math 3040: Spring 2009 The Integers Peter J. Kahn Contents 1. The Basic Construction 1 2. Adding integers 6 3. Ordering integers 16 4. Multiplying integers 18 Before we begin the mathematics of this section,

More information

The Potential and Challenges of CAD with Equational Constraints for SC-Square

The Potential and Challenges of CAD with Equational Constraints for SC-Square The Potential and Challenges of with Equational Constraints for SC-Square Matthew England (Coventry University) Joint work with: James H. Davenport (University of Bath) 7th International Conference on

More information

Part 1: Propositional Logic

Part 1: Propositional Logic Part 1: Propositional Logic Literature (also for first-order logic) Schöning: Logik für Informatiker, Spektrum Fitting: First-Order Logic and Automated Theorem Proving, Springer 1 Last time 1.1 Syntax

More information

SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic

SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic Didier Henrion Simone Naldi Mohab Safey El Din Version 1.0 of November 5, 2016 Abstract This document briefly describes

More information

7.5 Partial Fractions and Integration

7.5 Partial Fractions and Integration 650 CHPTER 7. DVNCED INTEGRTION TECHNIQUES 7.5 Partial Fractions and Integration In this section we are interested in techniques for computing integrals of the form P(x) dx, (7.49) Q(x) where P(x) and

More information

Choosing a variable ordering for truth-table invariant cylindrical algebraic decomposition by incremental triangular decomposition

Choosing a variable ordering for truth-table invariant cylindrical algebraic decomposition by incremental triangular decomposition Choosing a variable ordering for truth-table invariant cylindrical algebraic decomposition by incremental triangular decomposition Matthew England, Russell Bradford, James H. Davenport, and David Wilson

More information

On Possible Use of Quantifier Elimination Software in Upper Secondary Mathematics Education

On Possible Use of Quantifier Elimination Software in Upper Secondary Mathematics Education On Possible Use of Quantifier Elimination Software in Upper Secondary Mathematics Education Yosuke Sato ysato@rs.kagu.tus.ac.jp Ryoya Fukasaku fukasaku@rs.tus.ac.jp Department of Applied Mathematics Tokyo

More information

Calculus. Integration (III)

Calculus. Integration (III) Calculus Integration (III) Outline 1 Other Techniques of Integration Partial Fractions Integrals Involving Powers of Trigonometric Functions Trigonometric Substitution 2 Using Tables of Integrals Integration

More information

B Elements of Complex Analysis

B Elements of Complex Analysis Fourier Transform Methods in Finance By Umberto Cherubini Giovanni Della Lunga Sabrina Mulinacci Pietro Rossi Copyright 21 John Wiley & Sons Ltd B Elements of Complex Analysis B.1 COMPLEX NUMBERS The purpose

More information

Limits and Continuity

Limits and Continuity Chapter Limits and Continuity. Limits of Sequences.. The Concept of Limit and Its Properties A sequence { } is an ordered infinite list x,x,...,,... The n-th term of the sequence is, and n is the index

More information

LOGIC PROPOSITIONAL REASONING

LOGIC PROPOSITIONAL REASONING LOGIC PROPOSITIONAL REASONING WS 2017/2018 (342.208) Armin Biere Martina Seidl biere@jku.at martina.seidl@jku.at Institute for Formal Models and Verification Johannes Kepler Universität Linz Version 2018.1

More information

The Inductive Proof Template

The Inductive Proof Template CS103 Handout 24 Winter 2016 February 5, 2016 Guide to Inductive Proofs Induction gives a new way to prove results about natural numbers and discrete structures like games, puzzles, and graphs. All of

More information

a x a y = a x+y a x a = y ax y (a x ) r = a rx and log a (xy) = log a (x) + log a (y) log a ( x y ) = log a(x) log a (y) log a (x r ) = r log a (x).

a x a y = a x+y a x a = y ax y (a x ) r = a rx and log a (xy) = log a (x) + log a (y) log a ( x y ) = log a(x) log a (y) log a (x r ) = r log a (x). You should prepare the following topics for our final exam. () Pre-calculus. (2) Inverses. (3) Algebra of Limits. (4) Derivative Formulas and Rules. (5) Graphing Techniques. (6) Optimization (Maxima and

More information

Modern Algebra Prof. Manindra Agrawal Department of Computer Science and Engineering Indian Institute of Technology, Kanpur

Modern Algebra Prof. Manindra Agrawal Department of Computer Science and Engineering Indian Institute of Technology, Kanpur Modern Algebra Prof. Manindra Agrawal Department of Computer Science and Engineering Indian Institute of Technology, Kanpur Lecture 02 Groups: Subgroups and homomorphism (Refer Slide Time: 00:13) We looked

More information

2.5.2 Basic CNF/DNF Transformation

2.5.2 Basic CNF/DNF Transformation 2.5. NORMAL FORMS 39 On the other hand, checking the unsatisfiability of CNF formulas or the validity of DNF formulas is conp-complete. For any propositional formula φ there is an equivalent formula in

More information

Section 1.1: Logical Form and Logical Equivalence

Section 1.1: Logical Form and Logical Equivalence Section 1.1: Logical Form and Logical Equivalence An argument is a sequence of statements aimed at demonstrating the truth of an assertion. The assertion at the end of an argument is called the conclusion,

More information

MyMathLab for School Precalculus Graphical, Numerical, Algebraic Common Core Edition 2016

MyMathLab for School Precalculus Graphical, Numerical, Algebraic Common Core Edition 2016 A Correlation of MyMathLab for School Precalculus Common Core Edition 2016 to the Tennessee Mathematics Standards Approved July 30, 2010 Bid Category 13-090-10 , Standard 1 Mathematical Processes Course

More information

Introduction to Artificial Neural Networks and Deep Learning

Introduction to Artificial Neural Networks and Deep Learning Introduction to Artificial Neural Networks and Deep Learning A Practical Guide with Applications in Python Sebastian Raschka This book is for sale at http://leanpub.com/ann-and-deeplearning This version

More information

Math Precalculus I University of Hawai i at Mānoa Spring

Math Precalculus I University of Hawai i at Mānoa Spring Math 135 - Precalculus I University of Hawai i at Mānoa Spring - 2013 Created for Math 135, Spring 2008 by Lukasz Grabarek and Michael Joyce Send comments and corrections to lukasz@math.hawaii.edu Contents

More information

Equalities and Uninterpreted Functions. Chapter 3. Decision Procedures. An Algorithmic Point of View. Revision 1.0

Equalities and Uninterpreted Functions. Chapter 3. Decision Procedures. An Algorithmic Point of View. Revision 1.0 Equalities and Uninterpreted Functions Chapter 3 Decision Procedures An Algorithmic Point of View D.Kroening O.Strichman Revision 1.0 Outline Decision Procedures Equalities and Uninterpreted Functions

More information

3.1 Graphs of Polynomials

3.1 Graphs of Polynomials 3.1 Graphs of Polynomials Three of the families of functions studied thus far: constant, linear and quadratic, belong to a much larger group of functions called polynomials. We begin our formal study of

More information

Quadratic Equations Part I

Quadratic Equations Part I Quadratic Equations Part I Before proceeding with this section we should note that the topic of solving quadratic equations will be covered in two sections. This is done for the benefit of those viewing

More information

The symmetric subset-sum problem over the complex numbers

The symmetric subset-sum problem over the complex numbers The symmetric subset-sum problem over the complex numbers Mihai Prunescu Universität Freiburg, Abteilung Mathematische Logik, Eckerstr. 1, D-78103 Freiburg im Breisgau, Deutschland. Abstract A problem

More information

Solving Third Order Linear Differential Equations in Terms of Second Order Equations

Solving Third Order Linear Differential Equations in Terms of Second Order Equations Solving Third Order Linear Differential Equations in Terms of Second Order Equations Mark van Hoeij (Florida State University) ISSAC 2007 Talk presented by: George Labahn (University of Waterloo) Notations.

More information

Introduction to Logic in Computer Science: Autumn 2006

Introduction to Logic in Computer Science: Autumn 2006 Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Today s class will be an introduction

More information

Advanced Topics in LP and FP

Advanced Topics in LP and FP Lecture 1: Prolog and Summary of this lecture 1 Introduction to Prolog 2 3 Truth value evaluation 4 Prolog Logic programming language Introduction to Prolog Introduced in the 1970s Program = collection

More information

Hypersequent Calculi for some Intermediate Logics with Bounded Kripke Models

Hypersequent Calculi for some Intermediate Logics with Bounded Kripke Models Hypersequent Calculi for some Intermediate Logics with Bounded Kripke Models Agata Ciabattoni Mauro Ferrari Abstract In this paper we define cut-free hypersequent calculi for some intermediate logics semantically

More information

A Little Deductive Logic

A Little Deductive Logic A Little Deductive Logic In propositional or sentential deductive logic, we begin by specifying that we will use capital letters (like A, B, C, D, and so on) to stand in for sentences, and we assume that

More information

Linear Solving for Sign Determination

Linear Solving for Sign Determination Linear Solving for Sign Determination Daniel Perrucci arxiv:0911.5707v1 [math.ag] 30 Nov 2009 Abstract We give a specific method to solve with quadratic complexity the linear systems arising in known algorithms

More information

An analogy from Calculus: limits

An analogy from Calculus: limits COMP 250 Fall 2018 35 - big O Nov. 30, 2018 We have seen several algorithms in the course, and we have loosely characterized their runtimes in terms of the size n of the input. We say that the algorithm

More information

Computer Algebra: General Principles

Computer Algebra: General Principles Computer Algebra: General Principles For article on related subject see SYMBOL MANIPULATION. Computer algebra is a branch of scientific computation. There are several characteristic features that distinguish

More information

Basic methods to solve equations

Basic methods to solve equations Roberto s Notes on Prerequisites for Calculus Chapter 1: Algebra Section 1 Basic methods to solve equations What you need to know already: How to factor an algebraic epression. What you can learn here:

More information